summaryrefslogtreecommitdiff
path: root/misc/src/webserver/main.c
blob: 59362558ecd544b74127c07203e752d1eed8f2b4 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
/***************************************************************************
                                description
                             -------------------
    author               : (C) 2004 by Michael J. Flickinger
    email                : mjflick@cpan.org

 ***************************************************************************/

/***************************************************************************
 *                                                                         *
 *   This program is free software; you can redistribute it and/or modify  *
 *   it under the terms of the GNU General Public License as published by  *
 *   the Free Software Foundation; either version 2 of the License, or     *
 *   (at your option) any later version.                                   *
 *                                                                         *
 ***************************************************************************/


#include <stdio.h>
#include <stdlib.h>
#include <unistd.h>
#include <errno.h>
#include <string.h>
#include <sys/types.h>
#include <sys/socket.h>
#include <netinet/in.h>
#include <arpa/inet.h>
#include <sys/wait.h>
#include <signal.h>

#define BLOG 10

char *header = "<!DOCTYPE HTML PUBLIC \"-//IETF//DTD HTML 2.0//EN\">\n";
char recvin[500], password[25];
int s_port;

void sigchld_handler(int s)
{
	while(wait(NULL) > 0);
}

int main(int argc, char **argv)
{
	if (argc < 3)
	{
		printf("eAthena Web Server\n");
		printf("usage: %s [password] [port]\n", argv[0]);
		exit(0);
	}

	s_port = atoi(argv[2]);

	if ((s_port < 1) || (s_port > 65534))
	{
		printf("Error: The port you choose is not valid port.\n");
		exit(0);
	} 

	if (strlen(argv[1]) > 25)
	{
		printf("Error: Your password is too long.\n");
		printf("It must be shorter than 25 characters.\n");
		exit(0);
	}

	memset(password, 0x0, 25);
	memcpy(password, argv[1], strlen(argv[1]));

	int sockfd, new_fd;
	struct sockaddr_in my_addr;
	struct sockaddr_in their_addr;
	int sin_size;

	struct sigaction sa;

	int yes=1;

	if ((sockfd = socket(AF_INET, SOCK_STREAM,0)) == -1)
	{
		perror("Darn, this is broken.");
		exit(0);
	}

	if (setsockopt(sockfd, SOL_SOCKET, SO_REUSEADDR, &yes, sizeof(int)) == -1)
	{
		perror("Error... :-(");
	}

	//Now we know we have a working socket. :-)

	my_addr.sin_family = AF_INET;
	my_addr.sin_port = htons(s_port);
	my_addr.sin_addr.s_addr = INADDR_ANY;
	memset(&(my_addr.sin_zero), '\0', 8);

	if ( bind(sockfd, (struct sockaddr *)&my_addr, sizeof(struct sockaddr)) == -1)
	{
		perror("can not bind to this port");
		exit(0);
	}

	if ( listen(sockfd, BLOG) == -1)
	{
		perror("can not listen on port");
		exit(0);
	}

	sa.sa_handler = sigchld_handler;

	sigemptyset(&sa.sa_mask);
	sa.sa_flags = SA_RESTART;

	if (sigaction(SIGCHLD, &sa, NULL) == -1)
	{
		perror("sigaction sucks");
		exit(0);
	}

	printf("The eAthena webserver is up and listening on port %i.\n", s_port);

	while(1)
	{
		sin_size = sizeof(struct sockaddr_in);
		new_fd = accept(sockfd, (struct sockaddr *)&their_addr, &sin_size);

		if (!fork())
		{
			close(sockfd);
			memset(recvin, 0x0, 500);
			recv(new_fd, recvin, 500, 0);
			send(new_fd, header, strlen(header), 0);
			generate_page(password, new_fd, get_query(recvin), inet_ntoa(their_addr.sin_addr));
			log_visit(get_query(recvin), inet_ntoa(their_addr.sin_addr));

			close(new_fd);
			exit(0);
		}
		close(new_fd);	
	}

	return 0;
}